You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md
+1-23Lines changed: 1 addition & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -230,9 +230,6 @@ You can enforce Conditional Access policies, such as multifactor authentication
230
230
>
231
231
> Remote desktop using Windows Hello for Business authentication is available only for deployments that use a certificate trust model. It's currently not available for a key trust model.
232
232
233
-
> [!WARNING]
234
-
> The per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting is not supported for the Azure Windows VM Sign-In app.
235
-
236
233
## Log in by using Azure AD credentials to a Windows VM
237
234
238
235
> [!IMPORTANT]
@@ -396,31 +393,12 @@ You might see the following error message when you initiate a remote desktop con
396
393
397
394

398
395
399
-
If you've configured a Conditional Access policy that requires MFA before you can access the resource, you need to ensure that the Windows 10 or later PC that's initiating the remote desktop connection to your VM signs in by using a strong authentication method such as Windows Hello. If you don't use a strong authentication method for your remote desktop connection, you'll see the error.
396
+
If you've configured a Conditional Access policy that requires MFA or legacy per-user Enabled/Enforced Azure AD MFA before you can access the resource, you need to ensure that the Windows 10 or later PC that's initiating the remote desktop connection to your VM signs in by using a strong authentication method such as Windows Hello. If you don't use a strong authentication method for your remote desktop connection, you'll see the error.
400
397
401
398
Another MFA-related error message is the one described previously: "Your credentials did not work."
402
399
403
400

404
401
405
-
> [!WARNING]
406
-
> The legacy per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting is not supported for the Azure Windows VM Sign-In app. This setting causes sign-in to fail with the "Your credentials did not work" error message.
407
-
408
-
You can resolve the problem by removing the per-user MFA setting through these commands:
409
-
410
-
```
411
-
412
-
# Get StrongAuthenticationRequirements configure on a user
If you haven't deployed Windows Hello for Business and if that isn't an option for now, you can configure a Conditional Access policy that excludes the Azure Windows VM Sign-In app from the list of cloud apps that require MFA. To learn more about Windows Hello for Business, see [Windows Hello for Business overview](/windows/security/identity-protection/hello-for-business/hello-identity-verification).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/includes/defender-for-containers-enable-plan-aks.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,12 +161,12 @@ Request body parameters:
161
161
162
162
| Property | Description |
163
163
|----------|-------------|
164
-
| logAnalyticsWorkspaceResourceID | **Optional**. Full resource ID of your own Log Analytics workspace.<br>When not provided, the default workspace of the region will be used.<br><br>To get the full resource ID, run the following command to display the list of workspaces in your subscriptions in the default JSON format:<br>```az resource list --resource-type Microsoft.OperationalInsights/workspaces -o json```<br><br>The Log Analytics workspace resource ID has the following syntax:<br>/subscriptions/{your-subscription-id}/resourceGroups/{your-resource-group}/providers/Microsoft.OperationalInsights/workspaces/{your-workspace-name}. <br>Learn more in [Log Analytics workspaces](../../azure-monitor/logs/log-analytics-workspace-overview.md) |
164
+
| logAnalyticsWorkspaceResourceId | **Optional**. Full resource ID of your own Log Analytics workspace.<br>When not provided, the default workspace of the region will be used.<br><br>To get the full resource ID, run the following command to display the list of workspaces in your subscriptions in the default JSON format:<br>```az resource list --resource-type Microsoft.OperationalInsights/workspaces -o json```<br><br>The Log Analytics workspace resource ID has the following syntax:<br>/subscriptions/{your-subscription-id}/resourceGroups/{your-resource-group}/providers/Microsoft.OperationalInsights/workspaces/{your-workspace-name}. <br>Learn more in [Log Analytics workspaces](../../azure-monitor/logs/log-analytics-workspace-overview.md) |
165
165
166
166
You can include these settings in a JSON file and specify the JSON file in the `az aks create` and `az aks update` commands with this parameter: `--defender-config <path-to-JSON-file>`. The format of the JSON file must be:
Copy file name to clipboardExpand all lines: articles/iot-central/core/howto-faq.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ sections:
39
39
- question: |
40
40
How many IoT Central applications can I deploy in my subscription?
41
41
answer: |
42
-
Each Azure subscription has default quotas that could impact the scope of your IoT solution. Currently, IoT Central limits the number of applications you can deploy in a subscription to 10. If you need to increase this limit, contact [Microsoft support](https://azure.microsoft.com/support/options/).
42
+
Each Azure subscription has default quotas that could impact the scope of your IoT solution. Currently, IoT Central limits the number of applications you can deploy in a subscription to 100. If you need to increase this limit, contact [Microsoft support](https://azure.microsoft.com/support/options/).
Copy file name to clipboardExpand all lines: articles/iot-central/core/howto-integrate-with-devops.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ You need the following prerequisites to complete the steps in this guide:
52
52
53
53
To get started, fork the IoT Central CI/CD GitHub repository and then clone your fork to your local machine:
54
54
55
-
1. To fork the Git Hub repository, open the [IoT Central CI/CD GitHub repository](https://github.com/Azure/iot-central-CICD-sample) and select **Fork**.
55
+
1. To fork the GitHub repository, open the [IoT Central CI/CD GitHub repository](https://github.com/Azure/iot-central-CICD-sample) and select **Fork**.
56
56
57
57
1. Clone your fork of the repository to your local machine by opening a console or bash window and running the following command.
58
58
@@ -338,7 +338,7 @@ Now configure the pipeline to push configuration changes to your IoT Central app
338
338
```
339
339
340
340
1. Select **Save and run**.
341
-
1. The YAML file is saved to your Git Hub repository, so you need to provide a commit message and then select **Save and run** again.
341
+
1. The YAML file is saved to your GitHub repository, so you need to provide a commit message and then select **Save and run** again.
342
342
343
343
Your pipeline is queued. It may take a few minutes before it runs.
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-containers-overview.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,9 +41,13 @@ Compared to virtual machines, containers have the following advantages:
41
41
***Portability**: A containerized application image can be ported to run in the cloud, on premises, inside virtual machines, or directly on physical machines.
42
42
***Resource governance**: A container can limit the physical resources that it can consume on its host.
43
43
44
-
### Container types and supported environments
44
+
## Service Fabric support for containers
45
+
46
+
Service Fabric supports the deployment of Docker containers on Linux, and Windows Server containers on Windows Server 2016 and later, along with support for Hyper-V isolation mode.
45
47
46
-
Service Fabric supports containers on both Linux and Windows, and supports Hyper-V isolation mode on Windows.
48
+
Container runtimes compatible with ServiceFabric:
49
+
- Mirantis Container Runtime
50
+
- Moby
47
51
48
52
#### Docker containers on Linux
49
53
@@ -70,10 +74,6 @@ Here are typical examples where a container is a good choice:
70
74
71
75
***Reduce impact of "noisy neighbors" services**: You can use the resource governance ability of containers to restrict the resources that a service uses on a host. If services might consume many resources and affect the performance of others (such as a long-running, query-like operation), consider putting these services into containers that have resource governance.
72
76
73
-
## Service Fabric support for containers
74
-
75
-
Service Fabric supports the deployment of Docker containers on Linux, and Windows Server containers on Windows Server 2016 and later, along with support for Hyper-V isolation mode.
76
-
77
77
> [!NOTE]
78
78
> A Service Fabric cluster is single tenant by design and hosted applications are considered **trusted**. If you are considering hosting **untrusted applications**, please see [Hosting untrusted applications in a Service Fabric cluster](service-fabric-best-practices-security.md#hosting-untrusted-applications-in-a-service-fabric-cluster).
0 commit comments